Menu

Technology

ARTICLE


Superintelligence May Exacerbate Cybersecurity Weaknesses. Is CyberAGI the Solution?

Dec 5, 2025 | Products of the artificial intelligence boom – from deep learning, large language models and ...

ARTICLE


The Growth of Digital Banking and Its Risks

Sep 19, 2025 | In a world increasingly defined by digital disruption, few sectors have experienced transformation ...

ARTICLE


In Deregulatory Climate, Critics of Cybersecurity Rules Get Heard

Sep 12, 2025 | At a time of regulatory rollbacks and recalibrations, companies and industries are pushing back on ...

ARTICLE


Third-Party Risk Alarm: A JPMorgan Executive Calls Out Software-as-a-Service

Aug 8, 2025 | The volatile mix of geopolitical and cyber risks was expected to stir the pot at the 2025 RSA ...

ARTICLE


A Strong Security Technology Emerges Out of Crypto

Mar 7, 2025 | If there is one certainty about information security, it is that there are no silver bullets. Any ...

Trending Articles


Tokenization: Benefits and Risks

Tokenization is transforming previously illiquid markets by making them more accessible, securing ownership and enabling easy transfers. However, it...

Friday, January 24, 2025

The Risk Matrix Approach: Strengths and Limitations

The RMA is an effective and intuitive technique used by risk managers to prioritize threats to their organization in a graphic manner – but it’s not...

Friday, October 7, 2022

Quantum Computing: Breakthrough Performance Comes with High-Stakes Perils

Although the fully realized technology is years away, it is advancing incrementally, and risks are coming into focus

Friday, September 8, 2023

Agentic AI: On the Frontier of Autonomy

The capabilities build on, and go beyond, those of generative AI. The risks are still there.

Friday, June 13, 2025

ARTICLE


There Is More to Cyber Incident Reporting Than SEC Disclosure Requirements

Sep 13, 2024 | The Securities and Exchange Commission has given regulated entities a steady stream of new rules to ...

ARTICLE


A New Generation of Fake Documents Is Outrunning Conventional Anti-Fraud Capabilities

Aug 2, 2024 | In a short amount of time, developments in generative AI have leapt forward. Today there are ...

ARTICLE


After a Cyberattack, Assigning Blame Can Get Personal

Jun 7, 2024 | In the aftermath of a cyberattack, analysts seek to identify its cause or source in a task known as ...

ARTICLE


A Persistent and Systemic Threat Is Also a Common Thread

May 31, 2024 | It is a sign of the times that wherever business leaders gather, conversations converge on ...



We are a not-for-profit organization and the leading globally recognized membership association for risk managers.

weChat QR code.
red QR code.

BylawsCode of ConductPrivacy NoticeTerms of Use © 2024 Global Association of Risk Professionals